A secure patient monitoring solution using wireless sensor networks

[1]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[2]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[3]  Ranveer Chandra,et al.  SNOW: Sensor Network over White Spaces , 2016, SenSys.

[4]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[5]  Aduwati Sali,et al.  Node Replication Attacks in Mobile Wireless Sensor Network: A Survey , 2014, Int. J. Distributed Sens. Networks.

[6]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[7]  Adam Dunkels Rime - a lightweight layered communication stack for sensor networks. , 2007 .

[8]  Avijit Mathur,et al.  Healthcare WSN: Cluster Elections and Selective Forwarding Defense , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[9]  Filippo Attivissimo,et al.  A Smart Sensor Network for Sea Water Quality Monitoring , 2015, IEEE Sensors Journal.

[10]  Kyung Sup Kwak,et al.  An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[11]  Brian Meade,et al.  A Guide to Data Protection Legislation for Irish General Practice , 2011 .

[12]  John Viega,et al.  The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.

[13]  Yasir Arfat Malkani,et al.  A framework for securing mobile wireless sensor networks against physical attacks , 2016, 2016 International Conference on Emerging Technologies (ICET).

[14]  Hugo Krawczyk,et al.  Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..

[15]  P. Adams Frequently Asked Questions: Find it @ DMU , 2005 .

[16]  Ankit Thakkar,et al.  Cluster Head Election for Energy and Delay Constraint Applications of Wireless Sensor Network , 2014, IEEE Sensors Journal.

[17]  Li Xiao,et al.  Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[18]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.

[19]  Wen Gao,et al.  Watermark detection schemes with high security , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[20]  Fatang Chen,et al.  Enhanced Key Derivation Function of HMAC-SHA-256 Algorithm in LTE Network , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[21]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[22]  Ming-Yu Tsai,et al.  A Virtual Cluster Head Election Scheme for Energy-Efficient Routing in Wireless Sensor Networks , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.

[23]  Zhe Liu,et al.  Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes , 2013, ICICS.

[24]  Sana Ullah,et al.  A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications , 2013, Int. J. Distributed Sens. Networks.

[25]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[26]  Aref Meddeb,et al.  Optimal number of cluster heads for random topology WSNs using the stable election protocol , 2015, 2015 Global Summit on Computer & Information Technology (GSCIT).

[27]  Ms. S. Sudha,et al.  A Hospital Healthcare Monitoring System Using Wireless Sensor Networks , 2017 .

[28]  Wael Guibène,et al.  An evaluation of low power wide area network technologies for the Internet of Things , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[29]  Steffen Lochmann,et al.  Prototype of a secure wireless patient monitoring system for the medical community , 2011 .

[30]  R. Mitra,et al.  Improving wireless sensor network lifetime through power aware clustering technique , 2013, ARTCom 2013.

[31]  Feng Wang,et al.  Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches , 2011, IEEE Communications Surveys & Tutorials.

[32]  Pallikonda Rajasekaran Murugan,et al.  Sensor grid applications in patient monitoring , 2010, Future Gener. Comput. Syst..

[33]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[34]  Adam Dunkels,et al.  Run-time dynamic linking for reprogramming wireless sensor networks , 2006, SenSys '06.

[35]  Chang Liu,et al.  Sensor-Based Random Number Generator Seeding , 2015, IEEE Access.

[36]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[37]  Adam Dunkels,et al.  Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .

[38]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[39]  Subhas Chandra Medical IoT systems: architecture and security , 2017 .

[40]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[41]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[42]  Adam Dunkels,et al.  The ContikiMAC Radio Duty Cycling Protocol , 2011 .

[43]  A. Rameez Mohammed,et al.  Defense mechanism against selective forwarding attack in wireless sensor networks , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[44]  Vincent F. Taylor,et al.  Mitigating black hole attacks in wireless sensor networks using node-resident expert systems , 2014, 2014 Wireless Telecommunications Symposium.

[45]  Jose A. Gutierrez On the use of IEEE 802.15.4 to enable wireless sensor networks in building automation , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[46]  Tongtong Li,et al.  An energy efficient link-layer security protocol for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[47]  Anurag Tewari,et al.  Security and Privacy in E-Healthcare Monitoring with WBAN: A Critical Review , 2016 .

[48]  Philippas Tsigas,et al.  ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.

[49]  JeongGil Ko,et al.  MEDiSN: medical emergency detection in sensor networks , 2008, SenSys '08.

[50]  Jangeun Jun,et al.  MRP: Wireless mesh networks routing protocol , 2008, Comput. Commun..

[51]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[52]  Chenyang Lu,et al.  Reliable clinical monitoring using wireless sensor networks: experiences in a step-down hospital unit , 2010, SenSys '10.

[53]  Avijit Mathur,et al.  Cluster head election and rotation for medical-based wireless sensor networks , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).

[54]  Avijit Mathur,et al.  Medical WSN: Power, routing and selective forwarding defense , 2015, 2015 13th International Conference on Telecommunications (ConTEL).

[55]  Reza Ebrahimi Atani,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.

[56]  Victor Cionca A framework for the security configuration of wireless sensor networks. , 2011 .

[57]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[58]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[59]  D. McGrew,et al.  The Galois/Counter Mode of Operation (GCM) , 2005 .

[60]  Andrew H. Kemp,et al.  A dynamic cluster head election protocol for mobile wireless sensor networks , 2015, 2015 International Symposium on Wireless Communication Systems (ISWCS).

[61]  Nauman Aslam,et al.  C-Sec: Energy efficient link layer encryption protocol for Wireless Sensor Networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[62]  Mohamed F. Younis,et al.  Load-balanced clustering of wireless sensor networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[63]  Sean Turner,et al.  Transport Layer Security , 2014, IEEE Internet Computing.

[64]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[65]  Abdennaceur Kachouri,et al.  Improved election of cluster heads in LEACH , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[66]  Daojing He,et al.  A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[67]  Qijun Gu,et al.  Denial of Service Attacks , 2012 .

[68]  Thomas Watteyne,et al.  OpenMote: Open-Source Prototyping Platform for the Industrial IoT , 2015, ADHOCNETS.

[69]  Chiara Buratti,et al.  On the performance of an IEEE 802.15.6 Wireless Body Area Network , 2011, EW.

[70]  David Martins,et al.  Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless Sensor Networks , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[71]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[72]  Neelam Khemariya,et al.  An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs , 2013 .

[73]  Mohamed-Lamine Messai Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.

[74]  Xingming Sun,et al.  Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[75]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[76]  Xiaorui Wang,et al.  Geographic and energy-aware routing in Wireless Sensor Networks , 2009, Int. J. Ad Hoc Ubiquitous Comput..

[77]  R. Saravanan,et al.  A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.

[78]  Avijit Mathur,et al.  Medical WSN: Defense for selective forwarding attack , 2015, 2015 9th International Conference on Sensing Technology (ICST).

[79]  Saleha Mubarak AlMheiri,et al.  Data link layer security protocols in Wireless Sensor Networks: A survey , 2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC).

[80]  Sangita Chaudhari,et al.  DoS Attack Prevention Technique in Wireless Sensor Networks , 2016 .

[81]  Nikita V. Mahajan,et al.  Securing Multipath Routing Protocol Using Authentication Approach for Wireless Sensor Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[82]  Raymond Chi-Wing Wong,et al.  On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas , 2013, Int. J. Distributed Sens. Networks.

[83]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[84]  V. Milutinovic,et al.  A survey of military applications of wireless sensor networks , 2012, 2012 Mediterranean Conference on Embedded Computing (MECO).

[85]  Dauda Ayanda Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach , 2014 .

[86]  Sule Yildirim Yayilgan,et al.  Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[87]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[88]  Avijit Mathur,et al.  Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT , 2016, Sensors.

[89]  Kasim M. Al-Aubidy,et al.  Real-time patient health monitoring and alarming using wireless-sensor-network , 2016, 2016 13th International Multi-Conference on Systems, Signals & Devices (SSD).

[90]  Sofie Pollin,et al.  Chirp spread spectrum as a modulation technique for long range communication , 2016, 2016 Symposium on Communications and Vehicular Technologies (SCVT).

[91]  Praveen Budhwar,et al.  TinyOS: An Operating System for Wireless Sensor Networks , 2015 .

[92]  Habib Youssef,et al.  Security architecture for at-home medical care using Wireless Sensor Network , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[93]  辻見 裕史 低消費電力&短時間接続!シリアルはワイヤレスに Bluetoothの素を使いこなせ 最新4.0 Low Energy対応!即席I/Oアダプタ基板&ファームウェア (特集 スマホでもカンタンI/O!手の届かないチョコット先をリモート操縦 最新Low Energyモードもバッチリ!コイン電池ひとつで1年間! Bluetooth無線初体験!) -- (オリジナル・アプリ作るならコレ 電気屋で1,000円そこそこ LEモード対応!ドングル+部品10個で作る簡単I/Oアダプタ : 通信処理の始めから終わりまでを徹底解説) , 2013 .

[94]  Marek Neruda,et al.  The issue of LPWAN technology coexistence in IoT environment , 2016, 2016 17th International Conference on Mechatronics - Mechatronika (ME).

[95]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[96]  Hugo V. Bitencourt,et al.  Simulation Domains for Networked Embedded Systems , 2012 .

[97]  Elfed Lewis,et al.  A Lightweight Classification Algorithm for External Sources of Interference in IEEE 802.15.4-Based Wireless Sensor Networks Operating at the 2.4 GHz , 2014, Int. J. Distributed Sens. Networks.

[98]  Avijit Mathur,et al.  A secure end-to-end IoT solution , 2017 .

[99]  Xianbin Wang,et al.  Marine environment monitoring using Wireless Sensor Networks: A systematic review , 2014, 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[100]  V. C. Gungor,et al.  Wireless sensor networks for structure health monitoring: recent advances and future research directions , 2011 .

[101]  Muneer Bani Yassein,et al.  Smart homes automation using Z-wave protocol , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[102]  Hyung Yun Kong,et al.  Energy efficient cooperative LEACH protocol for wireless sensor networks , 2010, Journal of Communications and Networks.

[103]  Thomas C. Schmidt,et al.  RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[104]  Habib Youssef,et al.  Secure Data Transmission Protocol for Medical Wireless Sensor Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[105]  Tobias Reusing,et al.  Comparison of Operating Systems TinyOS and Contiki , 2012 .

[106]  Ludwig Seitz,et al.  S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.

[107]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[108]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[109]  Veltech Multitech HUMAN HEALTH MONITORING USING WIRELESS SENSORS NETWORK (WSN) , 2013 .

[110]  Peter Xiaoping Liu,et al.  Data gathering communication in wireless sensor networks using ant colony optimization , 2004, 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[111]  Thomas Newe,et al.  Trust security mechanism for maritime wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..